Enhance Security of Cloud Computing through Fork Virtual Machine

被引:0
|
作者
Elham, Hafida [1 ]
Lebbat, Adil [1 ]
Medromi, Hicham [1 ]
机构
[1] ENSEM, Natl Sch Elect & Mech, Lab Comp Syst & Renewable Energy, Casablanca, Morocco
关键词
Cloud Computing; Virtualization; Solutions of cloud computing; VM Fork;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a new trend based on virtualization. It motivates many academic institutions and non-academic to move towards this approach. Our goal is to enhance the security of the cloud computing through virtualization and more precisely by the principle of the fork of the virtual machine. This article describes the proposed solution to achieve this goal and discusses the choice of tools that will be used in the implementation of cloud computing platform to deploy and test the proposed architecture.
引用
收藏
页码:448 / 451
页数:4
相关论文
共 50 条
  • [1] ON VIRTUAL MACHINE SECURITY ISSUES IN CLOUD COMPUTING
    Zhang, Chaochao
    Bai, Ling
    Chen, Su
    Jiang, Hai
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY: PROCEEDINGS, 2012, : 75 - 79
  • [2] Security Strategy for Virtual Machine Allocation in Cloud Computing
    Jia, Hefei
    Liu, Xu
    Di, Xiaoqiang
    Qi, Hui
    Cong, Ligang
    Li, Jinqing
    Yang, Huamin
    2018 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS, 2019, 147 : 140 - 144
  • [3] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [4] MONITORING AND ATTESTATION OF VIRTUAL MACHINE SECURITY HEALTH IN CLOUD COMPUTING
    Zhang, Tianwei
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 28 - 37
  • [5] Security Issues Due to Vulnerabilities in the Virtual Machine of Cloud Computing
    Bhagat, Swapnil P.
    Patil, Vikram S.
    Meshram, Bandu B.
    INTELLIGENT COMPUTING AND COMMUNICATION, ICICC 2019, 2020, 1034 : 625 - 634
  • [6] A Game Theoretic Approach for Virtual Machine Allocation Security in Cloud Computing
    Ousmane, Sane Bernard
    Mbacke, Babou Cheikh Saliou
    Ibrahima, Niang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [7] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [8] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [9] Priority Based Virtual Machine Allocation and Scheduling for Security in Cloud Computing
    Radhika, T. V.
    Gouda, Krushna Chandra
    Kumar, S. Sathish
    SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 617 - 625
  • [10] Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms
    Caron, Eddy
    Le, Anh Dung
    Lefray, Arnaud
    Toinard, Christian
    2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 125 - 131